Vuln Scanner With Python

Overview

VulnScanner

Code

Version Language GitHub Repo stars


Features

Web Application Firewall (WAF) detection.

Cross Site Scripting (XSS) tests.

SQL injection time based test.

SQL injection error based test.

Local File Inclusion (LFI) test.

Cross Site Tracing (XST) test.


How To Run

git clone https://github.com/NullS0UL/VulnScanner

cd VulnScanner

python3 vulnscan.py http://example.com/page.php?cat=1

Example of Output

python3 vulnscan.py http://example.com/page.php?cat=1

[*] No WAF Detected.

Target: http://example.com/page.php?cat=1

Powered: PHP/5.6.40-38+ubuntu20.04.1+deb.sury.org+1

[!] Testing Cross Site Scripting (XSS)
[!] 10 Payloads.
[+] 9 Payloads were found.

[*] Payload found!
[!] Payload: <script>alert("inject")</script>
[!] POC: http://example.com/page.php?cat=<script>alert("inject")</script>

[*] Payload found!
[!] Payload: %3Cscript%3Ealert%28%22inject%22%29%3C%2Fscript%3E
[!] POC: http://example.com/page.php?cat=%3Cscript%3Ealert%28%22inject%22%29%3C%2Fscript%3E

[!] Testing SQLInjection
[*] Blind SQL injection time based found!
[!] Payload: 1-SLEEP(2)
[!] POC: http://example.com/page.php?cat=1-SLEEP(2)

[*] SQL Error found.
[!] Payload: '
[!] POC: http://example.com/page.php?cat='

[!] Testing Local File Inclussion (LFI)
[*] Payload found!
[!] Payload: ../../../../etc/passwd
[!] POC: http://example.com/page.php?cat=../../../../etc/passwd


[!] Testing Cross Site Tracing (XST)
[*] This site seems vulnerable to Cross Site Tracing (XST)!


Discaimer

Usage of the VulnScanner for attack targets without prior mutual consent is illegal. 
It is the end user's responsability to obey all applicable local, state, federal and international laws. 
Developer assume no liability and not responsible for any misuse or damage caused by this program.

Find me on

Facebook Telegram

Visit my Blog Site

  • Blogs
  • Owner
    < / N u l l S 0 U L >
    Use your brain , Make GOOGLE your friend 😘
    < / N u l l S 0 U L >
    Exploit grafana Pre-Auth LFI

    Grafana-LFI-8.x Exploit grafana Pre-Auth LFI How to use python3

    2 Jul 25, 2022
    Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities.

    👑 Recon 👑 The step of recognizing a target in both Bug Bounties and Pentest can be very time-consuming. Thinking about it, I decided to create my ow

    Dirso 171 Dec 31, 2022
    Security audit Python project dependencies against security advisory databases.

    Security audit Python project dependencies against security advisory databases.

    52 Dec 17, 2022
    Cam-Hacker: Ip Cameras hack with python

    Cam-Hacker Hack Cameras Mode Of Execution: apt-get install python3 apt-get insta

    Error 4 You 9 Dec 17, 2022
    Spring4Shell - Spring Core RCE - CVE-2022-22965

    Spring Core RCE - CVE-2022-22965 After Spring Cloud, on March 29, another heavyweight vulnerability of Spring broke out on the Internet: Spring Core R

    Malte Gejr 118 Dec 31, 2022
    Exploit for CVE-2017-17562 vulnerability, that allows RCE on GoAhead (< v3.6.5) if the CGI is enabled and a CGI program is dynamically linked.

    GoAhead RCE Exploit Exploit for CVE-2017-17562 vulnerability, that allows RCE on GoAhead ( v3.6.5) if the CGI is enabled and a CGI program is dynamic

    Francisco Spínola 2 Dec 12, 2021
    MVT is a forensic tool to look for signs of infection in smartphone devices

    Mobile Verification Toolkit Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic

    8.3k Jan 08, 2023
    Argument Injection in Dragonfly Ruby Gem

    CVE-2021-33564 PoC Exploit script for CVE-2021-33564 (Argument Injection in Dragonfly Ruby Gem). Usage Arbitrary File Read python3 poc.py -u https://

    Michael Tsai 12 Nov 09, 2022
    IDA plugin for quickly copying disassembly as encoded hex bytes

    HexCopy IDA plugin for quickly copying disassembly as encoded hex bytes. This whole plugin just saves you two extra clicks... but if you are frequentl

    OALabs 46 Oct 30, 2022
    Log4j command generator: Generate commands for CVE-2021-44228

    Log4j command generator Generate commands for CVE-2021-44228. Description The vulnerability exists due to the Log4j processor's handling of log messag

    1 Jan 03, 2022
    Evil-stalker - A simple tool written in python, it is so simple that it is based on google dorks

    evil-stalker How to run First of all, you must install the necessary libraries.

    rock3d 6 Nov 16, 2022
    Rouge Spammers with a mission to disrupt the peace of the valley ? Fear not we will STOMP the Spammers

    Rouge Spammers with a mission to disrupt the peace of the valley ? Fear not we will STOMP the Spammers New Update : adding 'on-review' tag on an issue

    A N U S H 13 Sep 19, 2021
    A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution

    CVE-2012-2982 John Hammond | September 4th, 2021 Checking searchsploit for Webmin 1.580 I only saw a Metasploit module for the /file/show.cgi Remote C

    John Hammond 25 Dec 08, 2022
    This tool was created in order to automate some basic OSINT tasks for penetration testing assingments.

    This tool was created in order to automate some basic OSINT tasks for penetration testing assingments. The main feature that I haven't seen much anywhere is the downloadd google dork function where t

    Tobias 5 May 31, 2022
    client attack remotely , this script was written for educational purposes only

    client attack remotely , this script was written for educational purposes only, do not use against to any victim, which you do not have permission for it

    9 Jun 05, 2022
    CVE-log4j CheckMK plugin

    CVE-2021-44228-log4j discovery (Download the MKP package) This plugin discovers vulnerable files for the CVE-2021-44228-log4j issue. To discover this

    4 Jan 08, 2022
    CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos

    A denial of service (DoS) vulnerability (CVE-2021-36798) was found in Cobalt Strike. The vulnerability was fixed in the scope of the 4.4 release. More

    104 Nov 09, 2022
    This is an advanced backdoor, created with Python

    Backdoor This is a Backdoor, created with Python 3. Types of Commands: Downloading / Uploading files. Launching / Deleting / Reading file's content. S

    swagkarna 28 Oct 28, 2022
    FIVE, Vulnerability Scanner And Mass Exploiter, made for pentesting.

    $ FIVE - FIVE is a Pentesting Framework to Test the Security & Integrity of a Website, or Multiple Websites. $ Info FIVE Was Made After Vulnnr to Prod

    Neon 24 Dec 10, 2021
    Dapunta Multi Brute Force Facebook - Crack Facebook With Login - Free

    ✭ DMBF CRACK Dibuat Dengan ❤️ Oleh Dapunta Author: - Dapunta Khurayra X ⇨ Fitur Login [✯] Login Token ⇨ Fitur Crack [✯] Crack Dari Teman, Public,

    Dapunta ID 10 Oct 19, 2022